Chapter 39: The First Broiler (Part I)

Chapter 39: The First Broiler (Part I)

After carefully checking his network and confirming that no one was following him, Zhang Yang couldn't wait to start experimenting with the things that God answered for him, Zhang Yang's current level is actually very high, but he is like you building a tall building, and the knowledge of the Red Domain can only be regarded as a part of it, an overall framework.

But if you want this building to be incomparably solid, beautiful, and one level higher than other buildings, then it is not enough to have a frame, and it can only be said to be an unfinished building. But with the framework, it's always much faster than starting from the foundation like everyone else. What Zhang Yang has to do now is to quickly fill in all these frameworks with the knowledge of the Blue Domain.

So after seeing God's short answers, Zhang Yang can quickly understand, and then it's useless to memorize these basic knowledge, now the only thing is practice. God has even told Zhang Yang in his answer that many hackers' broilers are accumulated overnight, and they don't look for broilers before every shot, so the newly found broilers are not safe, and preparing these broilers in advance depends on your means.

Low-level hackers find personal computers as broilers and springboards, while masters are looking for servers of some companies, and even large servers of some high-end technology companies, because the on/off time of personal computers is not fixed, and network restrictions sometimes affect the play, but the server is different, its computing rate is no problem, and its network is not a problem, as long as it can be called a server, then the network is at least dedicated line access.

However, since it is called a server, then the network security of these servers is naturally responsible for the security company, unless you think that your strength is higher than these security companies, otherwise, forget it, the province will be tracked by these security personnel to your IP, the gain outweighs the loss.

However, Zhang Yang now has a good experimental object, that is, the school server of S University, there is no doubt that S is rich and rich, as one of the top universities in China, every year, just a variety of graduates go out, and the donations of brothers and sisters who have successful careers are a huge amount.

Therefore, as a relatively prominent university in science in China, the strength of the computer department is naturally undoubted, and its servers are also very advanced, the difference is that although the servers of S University have a lot of security maintenance costs every year, but in fact, these servers are managed by the school's computer teachers and students, as for where the network security costs go, everyone understands.

There is no need to say these things, anyway, the school server does not have any important information, even if it is hacked, it is nothing more than the loss of some data, just take out the backup. Speaking of which, there is another layer of meaning to the school's server reluctance to hire a dedicated security company.

The computer department of S University can be said to be one of the best in China, and the strength of the computer department of Q University, which ranks first in the domestic comprehensive surname university, is needless to say. There are indeed a lot of high-tech people in the computer science departments of the two universities, and if you invite professional security experts, the cost of being hacked every time is too high.

And if you don't care, it will have a great incentive effect on these students in the computer department of your school, which is also one of the main reasons why the computer science department of S University can compete with Q University.

But this also gives Zhang Yang a chance, anyway, the school's server is also a server, which is better than a personal computer, and there is an advantage, if the school server is used as a springboard, even if someone tracks it down, as long as Zhang Yang hides his IP a little, there is no way to find it.

The external IP of the entire S University of 30,000 or 40,000 people is a public IP, and if you want to find a person from 30,000 or 40,000 people, the difficulty is no different from finding a needle in a haystack. At the beginning of the school year, Zhang Yang easily invaded the school's host, but this time it was different from last time, this time Zhang Yang wanted to build a super administrator in the host.

Building a super administrator is not the main thing, the main thing is to hide the account of the super administrator, there are many people in the management of the school server, so the account inside is also very complicated, there are seven or eight super administrator accounts alone. Sneakily hacked into the school's host, Zhang Yang used his own scanner to check several commonly used ports according to the information that was sent to him by a knife.

As mentioned in Yidaoliu, many hackers commonly use trapping methods in broilers to set and modify them on several major ports and some policies. These policy settings are rarely looked at, and even super admins don't bother to check them, so these places become the most common means of ambush trapping.

Because you want to create a super administrator account, you always have to go through these ports, and modify the policy, and the trap they place will send an alarm to tell the owner of the trap that there is someone who has hacked into the host. Needless to say, the power of Zhang Yang's scanner is still a scanner researched by God a few years later, and then after Zhang Yang learned from Thanatos, he added his own understanding and modified it.

The analysis results came out soon, originally Zhang Yang thought that the school's server should not have any masters, but when the scanning results came out, Zhang Yang understood that he still underestimated the group of animals in the computer department of S University, and there were many hidden masters in it.

There are several hidden traps in the main policy and port locations, four of which are inconspicuous and crude enough to be spotted with a little care. But one of the pitfalls is quite clever, if you're not careful, you'll think it's a system service, because it's perfectly integrated with the system's services.

Zhang Yang was immediately a little happy, after all, he didn't have enough experience in setting traps, although these people's settings were very rough, but they finally gave Zhang Yang some inspiration and experience. However, in the end, the trap of this system service is indeed quite clever, because it is disguised as a key service of a system, and the real system service is hidden, so even the average expert will not take it seriously.

It looks like there are a lot of "masters" of this server.,Hehe.,But now it's my Zhang.,The main function of these traps is to work when you don't find out.,Once a master finds out.,It's very simple to stop them from sending alarm messages.。 Zhang Yang quickly bypassed these traps and began to hack the school's management system.

While cracking the school management system, Zhang Yang copied the virus he had written, the tracking strategy used by this virus, and the hidden surname were definitely more powerful than the super virus that Zhang Yang discovered, and he didn't have to worry about being discovered at all. Moreover, this embedded virus will automatically replace the key files of the system, and at the same time hide the super administrator account that Zhang Yang created for a while.

***********************

How many recommended tickets are there...... Top Names on the New Books List...... Other people's tickets are thousands, we are so pitiful.